Watch this video on YouTube
How should an information security manager evaluate the effectiveness of a compliance program tailored to meet complex contractual obligations?